Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

VPN not working as responder #437

Open
abobakrahmed opened this issue Jul 15, 2020 · 14 comments
Open

VPN not working as responder #437

abobakrahmed opened this issue Jul 15, 2020 · 14 comments

Comments

@abobakrahmed
Copy link

Hello ,
have issue with openswan not working as responder execpt initate traffic that's my configuration :

conn my_vpn2
type=tunnel
authby=secret
auto=start
pfs=no
auth=esp
#Phase1#
ike=aes256-sha1;modp1536
phase2alg=aes256-sha1
aggrmode=no
keyexchange=ike
ikelifetime=86400s
#salifetime=28800s
keylife=3600s
#dpddelay=10
#dpdtimeout=20
#dpdaction=restart
#keyingtries=%forever
forceencaps=yes
left=4.4.4.4
leftsubnet=5.5.5.5/32
leftsourceip=4.4.4.4
right=6.6.6.6
rightsubnets={1.1.1.1/32,2.2.2.2/32,3.3.3.3/32}

@shussain
Copy link
Collaborator

Hi, what version of OSW rae you using? Can you post the content of ipsec barf?

@abobakrahmed
Copy link
Author

Linux Openswan U2.6.43/K4.14.171-105.231.amzn1.x86_64 (netkey)

@letoams
Copy link
Contributor

letoams commented Jul 15, 2020 via email

@abobakrahmed
Copy link
Author

abobakrahmed commented Jul 15, 2020

packet from 6.6.6.6:500: ignoring unknown Vendor ID payload [a9b9b1034f7e50a2513b47b100bb85a9]
| find_host_connection2 called from main_inI1_outR1, me=4.4.4.4:500 him=6.6.6.6:500 policy=none
| find_host_pair: comparing to 4.4.4.4:500 6.6.6.6:500
| find_host_pair_conn (find_host_connection2): 4.4.4.4:500 6.6.6.6:500 -> hp:my_vpn2/0x1
| started looking for secret for 4.4.4.4->6.6.6.6 of kind PPK_PSK
| actually looking for secret for 4.4.4.4->6.6.6.6 of kind PPK_PSK

@abobakrahmed
Copy link
Author

can destination telnet but when initiate traffic by telnet 1.1.1.1 443

@letoams
Copy link
Contributor

letoams commented Jul 15, 2020 via email

@abobakrahmed
Copy link
Author

How can get more logs !
works when I start connection by using telnet cmd but when finished this connection , another destination 6.6.6.6 cannot cannot telnet .

@letoams
Copy link
Contributor

letoams commented Jul 16, 2020 via email

@abobakrahmed
Copy link
Author

ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; force_encaps: yes
000 "my_vpn3/0x1": policy: PSK+ENCRYPT+TUNNEL+UP+IKEv2ALLOW+SAREFTRACK+lKOD+rKOD; prio: 32,8; interface: eth0;
000 "my_vpn3/0x1": dpd: action:clear; delay:0; timeout:0;
000 "my_vpn3/0x1": newest ISAKMP SA: #0; newest IPsec SA: #9;
000 "my_vpn3/0x1": aliases: my_vpn3
000 "my_vpn3/0x1": IKE algorithms wanted: AES_CBC(7)_256-SHA1(2)_000-MODP1024(2); flags=-strict
000 "my_vpn3/0x1": IKE algorithms found: AES_CBC(7)_256-SHA1(2)_160-MODP1024(2)
000 "my_vpn3/0x1": ESP algorithms wanted: AES(12)_256-SHA1(2)_000; pfsgroup=MODP1024(2); flags=-strict
000 "my_vpn3/0x1": ESP algorithms loaded: AES(12)_256-SHA1(2)_160
000 "my_vpn3/0x1": ESP algorithm newest: AES_256-HMAC_SHA1; pfsgroup=<N/A>

@abobakrahmed
Copy link
Author

002 "my_vpn2/0x3" #42: transition from state STATE_MAIN_I3 to state STATE_MAIN_I4
004 "my_vpn2/0x3" #42: STATE_MAIN_I4: ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=aes_256 prf=oakley_sha group=modp1536}
002 "my_vpn2/0x3" #42: Dead Peer Detection (RFC 3706): not enabled because peer did not advertise it
002 "my_vpn2/0x1" #43: initiating Quick Mode PSK+ENCRYPT+TUNNEL+UP+IKEv2ALLOW+SAREFTRACK {using isakmp#42 msgid:c6c1e035 proposal=AES(12)_256-SHA1(2)_160 pfsgroup=no-pfs}
002 "my_vpn2/0x2" #44: initiating Quick Mode PSK+ENCRYPT+TUNNEL+UP+IKEv2ALLOW+SAREFTRACK {using isakmp#42 msgid:24dbed3f proposal=AES(12)_256-SHA1(2)_160 pfsgroup=no-pfs}
002 "my_vpn2/0x3" #45: initiating Quick Mode PSK+ENCRYPT+TUNNEL+UP+IKEv2ALLOW+SAREFTRACK {using isakmp#42 msgid:6d48017b proposal=AES(12)_256-SHA1(2)_160 pfsgroup=no-pfs}
117 "my_vpn2/0x1" #43: STATE_QUICK_I1: initiate
117 "my_vpn2/0x2" #44: STATE_QUICK_I1: initiate
117 "my_vpn2/0x3" #45: STATE_QUICK_I1: initiate
002 "my_vpn2/0x3" #45: Dead Peer Detection (RFC 3706): not enabled because peer did not advertise it
002 "my_vpn2/0x3" #45: transition from state STATE_QUICK_I1 to state STATE_QUICK_I2
004 "my_vpn2/0x3" #45: STATE_QUICK_I2: sent QI2, IPsec SA established tunnel mode {ESP/NAT=>0xafcd430e <0x40b2edb7 xfrm=AES_256-HMAC_SHA1 NATOA=none NATD=none DPD=none}
002 "my_vpn2/0x1" #43: Dead Peer Detection (RFC 3706): not enabled because peer did not advertise it
002 "my_vpn2/0x1" #43: transition from state STATE_QUICK_I1 to state STATE_QUICK_I2
004 "my_vpn2/0x1" #43: STATE_QUICK_I2: sent QI2, IPsec SA established tunnel mode {ESP/NAT=>0xf74eead5 <0x9fbf8a5d xfrm=AES_256-HMAC_SHA1 NATOA=none NATD=none DPD=none}
002 "my_vpn2/0x2" #44: Dead Peer Detection (RFC 3706): not enabled because peer did not advertise it
002 "my_vpn2/0x2" #44: transition from state STATE_QUICK_I1 to state STATE_QUICK_I2
004 "my_vpn2/0x2" #44: STATE_QUICK_I2: sent QI2, IPsec SA established tunnel mode {ESP/NAT=>0xdaa8b71b <0x4b555d19 xfrm=AES_256-HMAC_SHA1 NATOA=none NATD=none DPD=none}

@abobakrahmed
Copy link
Author

i know this logs is huge but if can help me with any commends , will be appreciate

@letoams
Copy link
Contributor

letoams commented Jul 16, 2020 via email

@abobakrahmed
Copy link
Author

ipsec whack --initiate --name my_vpn2
ipsec whack --status
ipsec auto --status

@deef2020
Copy link

Please help me, there was no response when I entered IPSec auto -- up

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

4 participants